Preferred Language
Articles
/
ghbdi4cBVTCNdQwCIFUW
FILTER BASES AND SUPRA PERFECT FUNCTIONS
...Show More Authors

We introduce some new generalizations of some definitions which are, supra closure converge to a point, supra closure directed toward a set, almost supra converges to a set, almost supra cluster point, a set supra H-closed relative, supra closure continuous functions, supra weakly continuous functions, supra compact functions, supra rigid a set, almost supra closed functions and supra perfect functions. And we state and prove several results concerning it

Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 15 2023
Journal Name
Bionatura
Cytotoxic potential activity of quercetin derivatives on MCF-7 breast cancer cell line
...Show More Authors

Many previous investigations have found quercetin to be a powerful antioxidant and antitumor flavonoid, but its poor bioavailability has limited its use. This current study investigated the effects of two newly synthesized Quercetin Schiff bases containing 2-amino thiadiazole-5-thiol (Q1), and its benzyl derivatives (Q2) on MCF-7 human breast cancer cells. Cell viability and apoptosis were assessed to determine the toxic effects of Q1 and Q2. Cytotoxicity valuation showed that both compounds inhibited MCF-7 cell growth, and lactate dehydrogenase (LDH) activity increased in a dose-dependent aspect compared to the control group. Comet assay results observed that Q1 and Q2 induce more serious DNA damage than the control (untreated cell

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 15 2018
Journal Name
Pollution Research
STUDY THE EFFECT OF THE WAVES EMITTED FROM TOWERS COMMUNICATION IN SOME BIOLOGICAL STANDERDS FROM DIFFERENT REGIONS IN BAGHDAD
...Show More Authors

The mobile phone has become one of the most important in our days. The effects of waves from mobile base station may cause health effects on human. The aim of this work was to study the effect of radiofrequency (RF) emitted from mobile base station on the hemoglobin (Hb), packed cell (PCV), white blood cells (WBC) and liver enzymes activity including glutamic oxaloacetic transaminase (GOT), glutamic pyruvie transaminase (GPT) and Alkaline phosphatase (ALP). In this study the people divided into control group who living away from mobile base station and experimental group who living near to the mobile base station. The present result found there is no significant differences (P<0.05) in the Hb and PCV, but there was a significant increases (

... Show More
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Sources of income subject to tax in the Iraqi Income Tax Law No.113 of 1982
...Show More Authors

The tax is a financial amount collected from the taxpayer for the account of the public treasury.. and is the cornerstone of the close bond between members of the community and the country in which they live , as income tax is imposed on the profits and revenues achieved by people and often the constitution of most contemporary countries stipulate that the legislator is obligated to determine the sources of revenues and profits subjected to tax. Because the tax has a serious impact on people’s money because it is exposed to that money through direct deduction . Therefore, we note that the applicable income Tax Law stipulated that in order income to be subject to tax , it must be derived from one or more of the income sources st

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Methods To Prevent SQL Injection
...Show More Authors

  In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack.     SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input  such as form  and then include this input in database requests, typically SQL statements in a way that was not intende

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 02 2020
Journal Name
Journal Of The College Of Languages (jcl)
Examples of a Simile in the Poetry of Khwaju Kermani: نمونه هانى از تشبيه در اشعار خواجو كرمانى
...Show More Authors

A simile is a figure of speech that draws resemblance with the help of the words such as (like) or any other closer in meaning word. The present paper deals with the theme of a simile in the poetry of Khwaju Kermani, a truly great Persian poet. 

Besides being a great poet, Khwaju Kermani was also a fine professor of sciences. He was, also, known by his ghazals in which he imitated and was influenced by two of the most immense poets (Saadi) and (Hakim Sanai).

The search for knowledge, the pursue of studies and interpretation are among the main themes of Khwaju Kermani’s poetry. He uses ghazals to express love and longing in a mystical manner.

The present paper discusses the poet’s life, ethics and works.&n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Approximate Solution for Fuzzy Differential Algebraic Equations of Fractional Order Using Adomian Decomposition Method
...Show More Authors

      In this paper we shall prepare an  sacrificial solution for fuzzy differential algebraic equations of fractional order (FFDAEs) based on the Adomian decomposition method (ADM) which is proposed to solve (FFDAEs) . The blurriness will appear in the boundary conditions, to be fuzzy numbers. The solution of the proposed pattern of  equations is studied in the form of a convergent series with readily computable components. Several examples are resolved as  clarifications, the numerical outcomes are obvious that the followed approach is simple to perform and precise when utilized to (FFDAEs).

 

View Publication Preview PDF
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Approximate Solution for Fuzzy Differential Algebraic Equations of Fractional Order Using Adomian Decomposition Method
...Show More Authors

      In this paper we shall prepare an  sacrificial solution for fuzzy differential algebraic equations of fractional order (FFDAEs) based on the Adomian decomposition method (ADM) which is proposed to solve (FFDAEs) . The blurriness will appear in the boundary conditions, to be fuzzy numbers. The solution of the proposed pattern of  equations is studied in the form of a convergent series with readily computable components. Several examples are resolved as  clarifications, the numerical outcomes are obvious that the followed approach is simple to perform and precise when utilized to (FFDAEs).

View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Information Engineering And Applications
Development of Prognosis Factors in a Scoring System for Predicting of Breast Cancer Mortality
...Show More Authors

Today, the prediction system and survival rate became an important request. A previous paper constructed a scoring system to predict breast cancer mortality at 5 to 10 years by using age, personal history of breast cancer, grade, TNM stage and multicentricity as prognostic factors in Spain population. This paper highlights the improvement of survival prediction by using fuzzy logic, through upgrading the scoring system to make it more accurate and efficient in cases of unknown factors, age groups, and in the way of how to calculate the final score. By using Matlab as a simulator, the result shows a wide variation in the possibility of values for calculating the risk percentage instead of only 16. Additionally, the accuracy will be calculate

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Different Resolution Merging Methods For Environmental Areas Extraction
...Show More Authors

The usage of remote sensing techniques in managing and monitoring the environmental areas is increasing due to the improvement of the sensors used in the observation satellites around the earth. Resolution merge process is used to combine high resolution one band image with another one that have low resolution multi bands image to produce one image that is high in both spatial and spectral resolution. In this work different merging methods were tested to evaluate their enhancement capabilities to extract different environmental areas; Principle component analysis (PCA), Brovey, modified (Intensity, Hue ,Saturation) method and High Pass Filter methods were tested and subjected to visual and statistical comparison for evaluation. Both visu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique
...Show More Authors

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF